|Publication number||US5440618 A|
|Application number||US 08/254,455|
|Publication date||Aug 8, 1995|
|Filing date||Jun 6, 1994|
|Priority date||Sep 11, 1991|
|Also published as||EP0532102A2, EP0532102A3, EP0532102B1|
|Publication number||08254455, 254455, US 5440618 A, US 5440618A, US-A-5440618, US5440618 A, US5440618A|
|Inventors||Maximilian Riegel, Charlotte Ramsteck, Hans-Joachim Haber|
|Original Assignee||U. S. Philips Corporation|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (12), Referenced by (13), Classifications (12), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This is a continuation of application Ser. No. 07/941,002, filed on Sep. 8, 1992, now abandoned.
The invention relates to a system for checking the access to the data of a data unit arranged for connection to a public network and for data exchange with a second subscriber over this network.
Systems of this type are known. A data bank is mentioned here as an example, whose data can be transmitted to the subscriber over a public network. A requirement for the access to the data of the data bank is that the subscriber has dialled the data bank's telephone number and his own customer number or secret number.
Due to the secret number--usually--only an authorized subscriber has access to the data of the data bank. This provides for a certain check. However, this check is not sufficient for security-sensitive data, because systematic computer-aided continuous attempts with secret numbers have already "hacked" so many a data bank and computer, as is widely known.
It is an object of the invention to provide for a system of the type mentioned in the opening paragraph, in which the access to security-sensitive data of a data unit is not checked by means of secret numbers which can be transmitted over a public network.
This object is achieved by means of the following measures: An adapter which can be dialled via a secured network is allocated to the data unit, the adapter is arranged in such a way that, once it has been dialled, it causes the data unit to dial the second subscriber. These measures provide for protection against unauthorized access to the data produced by the data unit and also to the data applied to the data unit.
Advantageous embodiments of the invention are stated in the dependent claims.
The invention will be further explained with reference to the drawing FIGURE which represents a block diagram of an exemplary embodiment of the invention.
The drawing FIGURE shows three identically arranged subscribers T1, T2 and T3 which can be connected to a fourth subscriber T4 by way of a local exchange V. The connection from the three subscribers T1, T2 and T3 to the subscriber T4 is realized over two GPO telecom networks, namely the TEMEX network and the ISDN network.
TEMEX is a service of the German Post Office TELEKOM for the transmission of telecontrol information signals. It is used, for example, for reporting alerts. Therefore, the subscribers T1, T2 and T3 comprise sensors T14, T24 and T34 whose data are transferred by way of TEMEX adapters T15, T25 and T35. Each adapter is followed by a TEMEX power supply unit T16, T26 and T36 which is connected to a TEMEX computer V 1 in the public exchange via a point-to-point line. The point-to-point line changes its state only when the associated TEMEX adapter has an alert to be transmitted. By a return channel from the TEMEX computer V1 to one of the adapters T15, 725 or T35, simple instructions can be transmitted by the TEMEX computer V1 which instructions are encoded with a binary variable. Switching on or off a heating system may here be mentioned as an example.
The TEMEX computer V 1 combines the data of the point-to-point lines to a multiplex signal and transfers this signal to the fourth subscriber T4 which is a central monitoring position. The central monitoring position can give binary encoded instructions for a specific subscriber T1, 72 or T3 to the TEMEX computer V 1 by a return line. The messages and commands are processed by a computer T44 of the central monitoring position T4 and a protocol of them is made, as required, on a printer T42.
By the lines of the ISDN network the video codecs T10, T20 and T30 can be connected as data units to a video codec T40 by way of a dialling exchange V2. Before the data are transferred, for example, to buses Bu (So-connection), they are adapted to the ISDN network by means of an adapter comprising telephone number memories T11, T21, T31 and T41. Also the data which are necessary for setting up a connection and are to be transmitted to the exchange V2 in the case of a connection request, pass through the adapter.
The subscribers T1, T2 and T3 are equipped each with five video cameras T13, T23 and T33 for monitoring objects. The cameras can be connected to the associated video codec T10, 720 or T30 by way of a coupling network T12, T22 or T32. Via the connection line between the coupling network and the associated video codec both the coupling network and the position of the cameras can be adjusted.
By means of an ISDN telephone number the subscriber T1, for example, can be dialled from the central monitoring position, but its codec T10 is programmed in such a way that the codec does not supply data in that case.
Neither would any other subscriber of the ISDN network receive any data from the subscriber T1 if he called him. The knowledge of these data could, for example, make known which objects were monitored and thus provide useful information to unauthorized parties.
In order that the central monitoring position T4 receives the video data from the subscriber T1, T2 or T3 without using a secret number, a connection is realized between the TEMEX network and the ISDN network by way of bidirectional lines L1, L2, L3 and L4. Via the connection line L1, L2 or L3, when the central monitoring position T4 gives an instruction over the TEMEX network, the adapter T15, T25 or T35 is caused to dial the central monitoring position T4 by means of the telephone number stored in the memory of the adapter concerned. The transmission of the instruction is equal to a dialling of the subscriber T1, T2 or T3 over the TEMEX network. Once the connection has been established between one of the subscribers T1, T2 or T3 and the central monitoring position T4 over the ISDN network, the video data of the codec T10, T20 or T30 are transmitted, decoded by the codec T40, displayed on a monitor T43 or calculated by means of the computer T44.
From the central monitoring position T4 it is then also possible to transmit control signals to the cameras and, for example, change the adjustment of the cameras; it is likewise possible to modify parameters of the codecs by remote control.
Even if an unauthorized user succeeded over the TEMEX network in causing the video codecs to transmit security-sensitive data, these data would be transmitted to the central monitoring position T4 as a result of the stored telephone number in the adapter.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3984637 *||Nov 29, 1974||Oct 5, 1976||The Singer Company||Computer terminal security system|
|US4679226 *||Jun 17, 1985||Jul 7, 1987||Alltel Corporation||Computer security guard circuit|
|US4763350 *||Jun 13, 1985||Aug 9, 1988||Alcatel, N.V.||Facility for detecting and converting dial information and control information for service features of a telephone switching system|
|US4763351 *||Apr 24, 1985||Aug 9, 1988||Lipscher Bernard N||Computer security system|
|US4837805 *||Jun 22, 1987||Jun 6, 1989||Nec Corporation||Opening command transmission system and method capable of reducing overhead in an information processing unit|
|US4847890 *||Aug 10, 1987||Jul 11, 1989||The Telephone Connection||Anonymous interactive telephone system|
|US4922521 *||Mar 8, 1989||May 1, 1990||U.S. Philips Corporation||System for providing secure telecommunication access to a computer|
|US4922522 *||Jun 7, 1988||May 1, 1990||American Telephone And Telegraph Company||Telecommunications access to lottery systems|
|US4995109 *||May 24, 1989||Feb 19, 1991||Oki Electric Industry Co., Ltd.||Communication with a non-telephone terminal via a telephone switching network using two consecutive calls|
|US5115466 *||Oct 31, 1990||May 19, 1992||Alcatel Stk A/S||Communication network intended for secure transmission of speech and data|
|US5315634 *||Aug 31, 1990||May 24, 1994||Hitachi, Ltd.||Automatic trading method and apparatus|
|JPS6046650A *||Title not available|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US5852653 *||Aug 23, 1996||Dec 22, 1998||Reel; John Steven||Communications line security device|
|US5884096 *||Nov 12, 1997||Mar 16, 1999||Apex Pc Solutions, Inc.||Interconnection system for viewing and controlling remotely connected computers with on-screen video overlay for controlling of the interconnection switch|
|US6119233 *||May 15, 1997||Sep 12, 2000||Hawkins; Charles C.||Secure data communication system|
|US6304895||Jul 23, 1999||Oct 16, 2001||Apex Inc.||Method and system for intelligently controlling a remotely located computer|
|US7259482||Sep 24, 2003||Aug 21, 2007||Belkin International, Inc.||Distance extender and method making use of same|
|US7432619||Apr 25, 2007||Oct 7, 2008||Belkin International, Inc.||Distance extender|
|US7496666||Jan 3, 2006||Feb 24, 2009||Raritan Americas, Inc.||Multi-user computer system|
|US7747702||Oct 13, 2006||Jun 29, 2010||Avocent Huntsville Corporation||System and method for accessing and operating personal computers remotely|
|US8009173||Aug 2, 2007||Aug 30, 2011||Avocent Huntsville Corporation||Rack interface pod with intelligent platform control|
|US8269783||Jul 24, 2007||Sep 18, 2012||Avocent Redmond Corporation||KVM switch including a terminal emulator|
|US8427489||Sep 20, 2006||Apr 23, 2013||Avocent Huntsville Corporation||Rack interface pod with intelligent platform control|
|US20060173996 *||Jan 3, 2006||Aug 3, 2006||Philip Bates||Multi-user computer system|
|USRE44814||Mar 4, 2002||Mar 18, 2014||Avocent Huntsville Corporation||System and method for remote monitoring and operation of personal computers|
|U.S. Classification||379/93.04, 379/106.01|
|International Classification||H04M11/00, H04Q3/545, H04L12/22, H04L29/06|
|Cooperative Classification||H04L63/18, H04L12/22, H04L63/00|
|European Classification||H04L63/18, H04L63/00, H04L12/22|
|Apr 8, 1996||AS||Assignment|
Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:U.S. PHILIPS CORPORATION;REEL/FRAME:007881/0513
Effective date: 19960403
Owner name: LUCENT TECHNOLOGIES INC., NEW JERSEY
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:U.S. PHILIPS CORPORATION;REEL/FRAME:007854/0516
Effective date: 19960403
|Feb 1, 1999||FPAY||Fee payment|
Year of fee payment: 4
|Jan 8, 2003||FPAY||Fee payment|
Year of fee payment: 8
|Jan 12, 2007||FPAY||Fee payment|
Year of fee payment: 12